Contact us today!

FRS Pros Blog

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

What is Breadcrumb Navigation?
Breadcrumb navigation is more or less what the fairy tale would suggest it is: a path that leads back home (or in this case, the homepage). It is effectively an easier way to keep track of the path to and from a certain page (or area of an application) and is often displayed at the top of the viewed page. Each step provides a link that navigates back to the page in question.

So, let’s say that you were looking at a service page on some website. If the path to that page led from the homepage, to the second menu on the homepage, to the fifth menu item in that menu, the breadcrumbs would look something like this:

Home > [Menu 2] > [Menu Item 5]

Because these breadcrumbs serve as links, clicking on the [Menu 2] breadcrumb would bring you to that menu’s page, allowing you to continue browsing from there.

More Than Just Websites
You may also recognize this style of navigation from the toolbars of the folders and files saved to your system. This just makes it easier to find certain files again later and can be shared with another user if they need to know where a file is located.

Again, breadcrumbs are specifically meant to make navigation and organization easier for the user. Can you think of any other features that do the same? Leave your thoughts in the comments!

How Much Time Do You Spend Managing Vendors?
Is It Safe to Have Your Browser Remember Your Pass...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Tech Term Business Management Cloud Google Business Computing Software User Tips Hardware Microsoft Computer Malware Hackers Productivity Efficiency Browser Cybersecurity Mobile Devices Windows Data Backup Hosted Solutions Innovation Cybercrime Apps Internet of Things Smartphone Data Security Email IT Services Smartphones Operating System Outsourced IT Android Windows 10 Backup Office 365 Data Recovery Business Continuity Data Business Money Upgrade Phishing IT Support Alert VoIP Law Enforcement Disaster Recovery Ransomware Mobile Device Management Vulnerability Chrome Collaboration Network Saving Money Managed IT Services IT Support Server Best Practice Communications Employer-Employee Relationship Applications Microsoft Office Windows 10 Computers Blockchain Virtualization Information Two-factor Authentication Information Technology Passwords Managed Service Provider Managed IT Miscellaneous Telephone Systems Unsupported Software Tech Support Gadgets App Router Cloud Computing Spam Small Business Google Drive Holiday Avoiding Downtime Hacking Data Breach Touchscreen Data Storage Gmail Risk Management Save Money WiFi Travel Communication Mobile Device OneNote Excel Artificial Intelligence Managed Service Wi-Fi Audit Budget Update Government Fraud Mobile Security Wireless Technology Politics Bring Your Own Device Shortcut Data Protection Evernote Robot Data Management Workplace Tips Google Assistant User Error BDR Productivity Cost Management Managed IT Services The Internet of Things Social Media Networking Augmented Reality Users VPN iPhone Cortana Sports WannaCry Commerce Word Application Facebook Automation Encryption Password Patch Management Wireless Charging Safety Quick Tips Google Docs Project Management Hosted Solution Devices SaaS Proactive IT Licensing Mobility Updates Memory Search Comparison IT solutions Testing Laptop Outlook Computer Forensics Peripheral Emergency Transportation Microsoft Excel IT budget Bandwidth WIndows Server 2008 Chromebook Co-Managed Services Private Cloud Google Maps Spyware Alexa for Business Point of Sale Credit Cards App store iOS Camera Files Microsoft Word Financial DDoS Specifications Virus Windows 10s HBO Touchpad Computer Care Nanotechnology Management Access Control Recovery Going Green Social File Sharing Screen Mirroring Disaster Identity Theft Printing Telephone Apple Unified Threat Management Projects Tablets Maintenance Meetings Sales Proactive Solid State Drive Vendor Management Humor Sync Root Cause Analysis PowerPoint Admin Administrator Storage Social Engineering Emails Cast Vendor FAQ Computer Fan Hyperlink Streaming Media Edge Upgrades Lithium-ion battery Scam Identity NFL eWaste Hybrid Cloud Retail Websites Hard Disk Drive IT Management Samsung Wireless Internet Access Identities Marketing BYOD Employee-Employer Relationship Charger Value Wasting Time Chromecast Reputation Data Loss Ciminal Data Privacy Windows 7 Legal History Device Security Amazon Telephony Data storage Conferencing Data Theft IT Solutions Antivirus Adobe Workers Gamification Internet Exlporer Remote Computing Health Legislation Language Webinar Business Technology Accessory Consultant Software as a Service Hard Drive Display Windows Ink Wireless Remote Monitoring Virtual Assistant Uninterrupted Power Supply Settings Gifts Computing Television CrashOverride Instant Messaging Hacker Office tips Company Culture Scalability Analytics Advertising Entertainment Keyboard es Black Market Cleaning Big Data Automobile Office HaaS Managing Stress End of Support USB Worker Relocation How To Books Compliance Printers Video Games Experience Personal Information Thank You Education Hiring/Firing Work/Life Balance Virtual Reality PDF Current Events Electronic Medical Records Regulation Crowdsourcing Employer Employee Relationship Phone System Mobile Computing Cache Congratulations Benefits Save Time Text Messaging Training Monitors Twitter Computer Accessories Flexibility Music Battery Smart Technology